Healthy computing

These are some tips about "Healthy computing". The e Book Healthy computing is a must read for every person that spends more than 4 hour in front of the monitor. Healthy computing is for you.

Monday, April 10, 2006

Laptop Security

Healthy computing.

Laptop security measures include taking care of the physical security of the laptop, securing laptop contents from unwanted eyes, and tracking down a stolen laptop. There are several ways to increase laptop security. Below is a short review of the most common ones.
Engraving / Marking – One option is to permanently mark (or engrave) the outer case of the laptop with your name, address and phone. It is also a good idea to engrave or place an adhesive label on the underside of the battery compartment where your identification is not noticed or can be readily removed. Include your name, address and date of birth. Do not use a Social Security number.
Record Keeping - Register the laptop with the manufacturer. This will “flag” your machine in the event that a thief ever sends it in for maintenance, and increases your odds of getting it back. It is also important to write down your laptop’s serial number and store it in a safe place. In the event your laptop is stolen, it is extremely important to have these numbers to give to the police. .
Cable Locks - Cable locks are an inexpensive way to secure the laptop from being stolen. The cable locks function much in the same fashion as bicycle cable locks do. The cable is wrapped to an immovable object (such as a table leg) and the security clip in the laptop. The system is secured with a padlock. While this is a quick and easy security measure, it is still vulnerable, much in the same way as bicycle cable locks. Remember however if you have taken the means to secure your laptop, a thief more than likely will go to the next laptop they find unsecured.
The following links are good resources for laptop physical security devices:
Secure-It: http://www.secure-it.com/products/notebook/laptop_cables_locks.htm
Beach Audio: http://www.beachaudio.com/index.php?cPath=206_236_2568
Alarms - Alarms work much in the same way as car alarms. If the laptop is moved or handled without authorization, the system will give a warning signal that resembles the ones heard in cars (there are other optional ways to make the alarm). There are many different kinds of alarm systems. The simplest ones are integrated into the cable lock, which, if broken, will start the alarm. These alarms can be purchased at office supply stores.
http://www.etravelergear.com/traclapprot.html
Laptop Tracking - Similarly to stolen cars, also stolen laptops can be tracked and recovered. The most advanced of these tracking systems use the cell phone network (or satellite via GPS) to communicate the laptops location with the central tracking computer. This system depends on a piece of hardware, placed inside the laptop.
Another way to increase security of the laptop and track stolen laptops is via a software tracking code placed in the laptop's hard drive. The software, which resides undetected, will communicate periodically with a central system through the Internet. The software communicates the laptop’s location, which will enable recovery of the laptop. Individuals can get more information about laptop tracking and purchase software from these and other companies: CompuTrace, SecureIT, Stealth Signal, and ZTrace.
Your laptop can also be registered with the STOP Program. If you loose your laptop, STOP works with the local police, the FBI, and INTERPOL to track it down. And, once STOP locates it, STOP takes care of returning it to you.
User Identification - The most obvious security measure in this regard is using the BIOS password. More advanced ways to identify the laptop user are smart cards and biometrics, such as voice or fingerprint recognition software and hardware.
Protect your data by locking your PCMCIA cards when not in use. Eject these cards from the laptop bay and lock them in a safe place whenever you are away from the laptop.
Information gathered from LabMice.net and Laptop-guide.com
6 Tips to Help Prevent Laptop Theft
When on the move, keep your belongings in sight and never leave your laptop unattended.
Try not to leave your laptop in a vehicle. If you must, ensure it's in the trunk or covered up - not in plain view.
Don't leave a meeting or class room without your laptop. Take it with you, or it may not be there when you return.
Lock your laptop in your room during off-hours. Or put the laptop in a locked closet or cabinet.
Utilize Kensington style cable and lock for your laptop when left unattended.
Install Computrace on your PC, so if it’s lost or stolen you have a greater chance of getting it back or receive up to $1000.

Removable Storage/ Drive Security
As computer systems such as the laptop become more portable, use of removable storage devices (RSD) also become more convenient. Balancing “security with convenience” is very difficult to achieve. A good example is the convenience of items such as the ever-growing popularity of the “Flash or Jump Drive”, external hard drives and removable drives. Unfortunately, loss or theft of your portable storage devices is easy and presents numerous problems. Not only have you lost potentially valuable data, depending upon the contents of your device you may have opened yourself up to identity theft. Keeping your portable devices secure and accounted for is just as important as keeping your laptop secure. Following are few tips to help balance “convenience and security”.
Always have your RSD in your possession or locked away when not in use. Never leave your laptop and device unattended in the Library or other study areas.
Never place personal identifying information such as Social Security Number, Phone Numbers, Bank / Credit Card numbers, passwords, etc…
Don’t be distracted away from your Laptop with your Flash Drive connected. It only takes a second for someone to unplug your device and walk away undetected.
Consider the use of “Thumb Drives” that require your thumb print be used to access the information on your device. You may also want to use drives that encrypt your information for added security.
Just as important as Flash Drives, you should take the same care to secure date CDs, Floppy Disks, Zip Drives or any type of RSD.
While we often believe bigger is better, it may be more beneficial to have a few 32MB drives than it is to have a 1GB. For certain smaller projects you may want to consider using a CD to store data. This allows you to use your collection of drives or CDs for different purposes or projects. If you loose one you haven’t lost everything. The important habit becomes keeping track of all your discs or drives to ensure their security.
Always back-up your important data and secure your back-up discs/drives. A good practice on campus is to use your “P” drive as a back-up.
As with all computer hardware and information, security is paramount. All your hard work and research is of no use if you have not practiced good security procedures and your information is lost or stolen.

http://www.thepurplegenie.com/healthycomputing.htm
Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

1 Comments:

Blogger Unknown said...

it is logical to conclude that as it becomes increasingly using the cloud as not only store data but also, and especially, as a provider of applications, services.
computer security courses


Thanks for sharing...!!!

2:43 AM  

Post a Comment

<< Home